Cargando…

Information Security Scheme Based on Computational Temporal Ghost Imaging

An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can...

Descripción completa

Detalles Bibliográficos
Autores principales: Jiang, Shan, Wang, Yurong, Long, Tao, Meng, Xiangfeng, Yang, Xiulun, Shu, Rong, Sun, Baoqing
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Nature Publishing Group UK 2017
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5550463/
https://www.ncbi.nlm.nih.gov/pubmed/28794473
http://dx.doi.org/10.1038/s41598-017-07816-2
_version_ 1783256132502945792
author Jiang, Shan
Wang, Yurong
Long, Tao
Meng, Xiangfeng
Yang, Xiulun
Shu, Rong
Sun, Baoqing
author_facet Jiang, Shan
Wang, Yurong
Long, Tao
Meng, Xiangfeng
Yang, Xiulun
Shu, Rong
Sun, Baoqing
author_sort Jiang, Shan
collection PubMed
description An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively.
format Online
Article
Text
id pubmed-5550463
institution National Center for Biotechnology Information
language English
publishDate 2017
publisher Nature Publishing Group UK
record_format MEDLINE/PubMed
spelling pubmed-55504632017-08-11 Information Security Scheme Based on Computational Temporal Ghost Imaging Jiang, Shan Wang, Yurong Long, Tao Meng, Xiangfeng Yang, Xiulun Shu, Rong Sun, Baoqing Sci Rep Article An information security scheme based on computational temporal ghost imaging is proposed. A sequence of independent 2D random binary patterns are used as encryption key to multiply with the 1D data stream. The cipher text is obtained by summing the weighted encryption key. The decryption process can be realized by correlation measurement between the encrypted information and the encryption key. Due to the instinct high-level randomness of the key, the security of this method is greatly guaranteed. The feasibility of this method and robustness against both occlusion and additional noise attacks are discussed with simulation, respectively. Nature Publishing Group UK 2017-08-09 /pmc/articles/PMC5550463/ /pubmed/28794473 http://dx.doi.org/10.1038/s41598-017-07816-2 Text en © The Author(s) 2017 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/.
spellingShingle Article
Jiang, Shan
Wang, Yurong
Long, Tao
Meng, Xiangfeng
Yang, Xiulun
Shu, Rong
Sun, Baoqing
Information Security Scheme Based on Computational Temporal Ghost Imaging
title Information Security Scheme Based on Computational Temporal Ghost Imaging
title_full Information Security Scheme Based on Computational Temporal Ghost Imaging
title_fullStr Information Security Scheme Based on Computational Temporal Ghost Imaging
title_full_unstemmed Information Security Scheme Based on Computational Temporal Ghost Imaging
title_short Information Security Scheme Based on Computational Temporal Ghost Imaging
title_sort information security scheme based on computational temporal ghost imaging
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5550463/
https://www.ncbi.nlm.nih.gov/pubmed/28794473
http://dx.doi.org/10.1038/s41598-017-07816-2
work_keys_str_mv AT jiangshan informationsecurityschemebasedoncomputationaltemporalghostimaging
AT wangyurong informationsecurityschemebasedoncomputationaltemporalghostimaging
AT longtao informationsecurityschemebasedoncomputationaltemporalghostimaging
AT mengxiangfeng informationsecurityschemebasedoncomputationaltemporalghostimaging
AT yangxiulun informationsecurityschemebasedoncomputationaltemporalghostimaging
AT shurong informationsecurityschemebasedoncomputationaltemporalghostimaging
AT sunbaoqing informationsecurityschemebasedoncomputationaltemporalghostimaging